General

  • Target

    2144-743-0x0000000000ED0000-0x0000000000F0E000-memory.dmp

  • Size

    248KB

  • MD5

    d028369a4e54846b0f5972ab58b9cdd9

  • SHA1

    b80a1862a9d78687e170145f93f3194e6e180ec0

  • SHA256

    92bbbd49c0c222e1b36b4352d37bb5dc3573f28114d2b2aa60747a023ba0606c

  • SHA512

    57d3afd80506b42532e42c8b6dbbf9f1bd631ae58f4cf3a8904898dc2f33d56f81cb5e935599b6dd06f8237a2bc4c48365006b64f68b303fc556b050b9ed1564

  • SSDEEP

    3072:d2PLqOze7nDNgcYde+t9P/Kt/qbe9aKC9GYYOtLDI:d0Lm7DNgc8vtO/D9aKC9V5tL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

clientfile

C2

194.180.49.159:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2144-743-0x0000000000ED0000-0x0000000000F0E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections